2014
DOI: 10.1186/s13635-014-0014-4
|View full text |Cite
|
Sign up to set email alerts
|

Optimized combined-clustering methods for finding replicated criminal websites

Abstract: To be successful, cybercriminals must figure out how to scale their scams. They duplicate content on new websites, often staying one step ahead of defenders that shut down past schemes. For some scams, such as phishing and counterfeit goods shops, the duplicated content remains nearly identical. In others, such as advanced-fee fraud and online Ponzi schemes, the criminal must alter content so that it appears different in order to evade detection by victims and law enforcement. Nevertheless, similarities often … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…The use of clustering techniques to analyze the content and infrastructure of fraudulent websites has been recently investigated to combat other malicious online activities carried out across a variety of website categories. A few examples are as follows: acquisition of cryptocurrency funds from unsuspecting investors with the false promise of gaining more cryptocurrency or accessing a service [26], sale and delivery of fictitious pets through scam websites [27], monetization of parked domain names through hosting ads [28], distribution of exploit kits through malicious websites [29], fake escrow services and high-yield investment programs [30], video piracy [31], and phishing websites [32]. Analogous to anticounterfeiting, studies in these fields report that a limited number of entities are running multiple instances of similar scams.…”
Section: Clustering Fraudulent Websitesmentioning
confidence: 99%
See 3 more Smart Citations
“…The use of clustering techniques to analyze the content and infrastructure of fraudulent websites has been recently investigated to combat other malicious online activities carried out across a variety of website categories. A few examples are as follows: acquisition of cryptocurrency funds from unsuspecting investors with the false promise of gaining more cryptocurrency or accessing a service [26], sale and delivery of fictitious pets through scam websites [27], monetization of parked domain names through hosting ads [28], distribution of exploit kits through malicious websites [29], fake escrow services and high-yield investment programs [30], video piracy [31], and phishing websites [32]. Analogous to anticounterfeiting, studies in these fields report that a limited number of entities are running multiple instances of similar scams.…”
Section: Clustering Fraudulent Websitesmentioning
confidence: 99%
“…All these studies were conducted using a particular clustering algorithm on a whole (domain-specific) set of features. One partial exception is [30], where a hierarchical agglomerative clustering algorithm was run on all possible combinations of individual features. However, this approach requires labeled training data to select the top-performing combination.…”
Section: Clustering Fraudulent Websitesmentioning
confidence: 99%
See 2 more Smart Citations